智慧电子图书馆 本次搜索耗时 0.463 秒,为您找到 7 个相关结果.
  • Control Exposing the Truth About Guns

    When our founding fathers secured the Constitutional “right of the people to keep and bear arms,” they also added the admonition that this right SHALL NOT BE INFRINGED. It is the o...
  • The Burning Bridge - John Flanagan

    SUMMARY: For years, the Kingdom of Araluen has prospered, with the evil lord Morgarath safely behind the impassable mountains. For years, its people have felt secure. but the schem...
  • SSH, the Secure Shell, 2nd Edit - Daniel J. Barrett;Richard E. Si

    SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely availabl...
  • Last Man in Tower - Aravind Adiga

    Review“As with The White Tiger, [in Last Man in Tower] Adiga describes an India that is avaricious, acquisitive and insecure. His earlier work told the story of a de...
  • Ender's Game - Orson Scott Card

    SUMMARY:Winner of the Hugo and Nebula Awards In order to develop a secure defense against a hostile alien race's next attack, government agencies breed child geniuses and tr...
  • Doctor Who_ Dragons' Wrath - Justin Richards

    Product DescriptionAre the Knights of Jeneve more than legend? Why is the warlord Nusek so desperate to secure Benny's services? In a world of secret societies, concealed motives a...
  • Bury the Lead - David Rosenfelt

    SUMMARY: I watch sixteen football games over nine hours. It's an extraordinary accomplishment...With the remote secure in the palm of my hand, or more often resting on my chest, I ...